Win a WiFi Pod
by writing an exploit
for Openbsd's Cron

The WiFi Pod runs high speed WiFi 6 and is powered by a lightning fast Raspberry Pi 5™.

SPR Pod

Background

Dave Goldsmith of Supernetworks found a heap underflow vulnerability in cron's command parser. We were able to to show theoretical exploitability but did not make it practical. Can you write a reliable exploit?

Contest Rules

1. Submit writeups by e-mail to cron at supernetworks.org

2. The first submission which includes a functional, working exploit will be awarded a WiFi pod as prize.

3. The deadline is Dec 31st, 2024

4. The exploit should function against openbsd 7.5 as of source commit 751977b3995c677a0c26a0d68ade0ae40d562050 and elevate privileges from an ordinary user to crontab and/or root.